| Existing Patterns
Modified with Enhanced Material
|
| CAPEC-3 |
Using Leading 'Ghost' Character Sequences to Bypass Input Filters |
| CAPEC-7 |
Blind SQL Injection |
| CAPEC-9 |
Buffer Overflow in Local Command-Line Utilities |
| CAPEC-10 |
Buffer Overflow via Environment Variables |
| CAPEC-11 |
Cause Web Server Misclassification |
| CAPEC-13 |
Subverting Environment Variable Values |
| CAPEC-14 |
Client-side Injection-induced Buffer Overflow |
| CAPEC-18 |
Embedding Scripts in Non-Script Elements |
| CAPEC-24 |
Filter Failure through Buffer Overflow |
| CAPEC-25 |
Forced Deadlock |
| CAPEC-26 |
Leveraging Race Conditions |
| CAPEC-27 |
Leveraging Race Conditions via Symbolic Links |
| CAPEC-28 |
Fuzzing |
| CAPEC-29 |
Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions |
| CAPEC-30 |
Hijacking a Privileged Thread of Execution |
| CAPEC-31 |
Accessing/Intercepting/Modifying HTTP Cookies |
| CAPEC-32 |
Embedding Scripts in HTTP Query Strings |
| CAPEC-39 |
Manipulating Opaque Client-based Data Tokens |
| CAPEC-47 |
Buffer Overflow via Parameter Expansion |
| CAPEC-53 |
Postfix, Null Terminate, and Backslash |
| CAPEC-62 |
Cross Site Request Forgery |
| CAPEC-64 |
Using Slashes and URL Encoding Combined to Bypass Validation Logic |
| CAPEC-65 |
Sniff Application Code |
| CAPEC-67 |
String Format Overflow in syslog() |
| CAPEC-68 |
Subvert Code-signing Facilities |
| CAPEC-69 |
Target Programs with Elevated Privileges |
| CAPEC-71 |
Using Unicode Encoding to Bypass Validation Logic |
| CAPEC-72 |
URL Encoding |
| CAPEC-74 |
Manipulating User State |
| CAPEC-76 |
Manipulating Web Input to File System Calls |
| CAPEC-77 |
Manipulating User-Controlled Variables |
| CAPEC-78 |
Using Escaped Slashes in Alternate Encoding |
| CAPEC-79 |
Using Slashes in Alternate Encoding |
| CAPEC-96 |
Block Access to Libraries |
| CAPEC-100 |
Overflow Buffers |
| CAPEC-106 |
Cross Site Scripting through Log Files |
| CAPEC-123 |
Buffer Manipulation |
| CAPEC-124 |
Shared Data Manipulation |
| CAPEC-126 |
Path Traversal |
| CAPEC-128 |
Integer Attacks |
| CAPEC-129 |
Pointer Manipulation |
| CAPEC-139 |
Relative Path Traversal |
| CAPEC-141 |
Cache Poisoning |
| CAPEC-142 |
DNS Cache Poisoning |
| CAPEC-146 |
XML Schema Poisoning |
| CAPEC-149 |
Explore for Predictable Temporary File Names |
| CAPEC-153 |
Input Data Manipulation |
| CAPEC-155 |
Screen Temporary Files for Sensitive Information |
| CAPEC-161 |
Infrastructure Manipulation |
| CAPEC-162 |
Manipulating Hidden Fields |
| CAPEC-163 |
Spear Phishing |
| CAPEC-164 |
Mobile Phishing |
| CAPEC-165 |
File Manipulation |
| CAPEC-166 |
Force the System to Reset Values |
| CAPEC-170 |
Web Application Fingerprinting |
| CAPEC-180 |
Exploiting Incorrectly Configured Access Control Security Levels |
| CAPEC-224 |
Fingerprinting |
| CAPEC-234 |
Hijacking a privileged process |
| CAPEC-235 |
Implementing a callback to system routine (old AWT Queue) |
| CAPEC-236 |
Catching exception throw/signal from privileged block |
| CAPEC-248 |
Command Injection |
| CAPEC-267 |
Leverage Alternate Encoding |
| CAPEC-268 |
Audit Log Manipulation |
| CAPEC-271 |
Schema Poisoning |
| CAPEC-462 |
Cross-Domain Search Timing |
| CAPEC-490 |
Amplification |
| CAPEC-536 |
Data Injected During Configuration |